Home

Description

In the Linux kernel, the following vulnerability has been resolved: gfs2: fix double destroy_workqueue error When gfs2_fill_super() fails, destroy_workqueue() is called within gfs2_gl_hash_clear(), and the subsequent code path calls destroy_workqueue() on the same work queue again. This issue can be fixed by setting the work queue pointer to NULL after the first destroy_workqueue() call and checking for a NULL pointer before attempting to destroy the work queue again.

PUBLISHED Reserved 2024-10-21 | Published 2024-10-21 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

30e388d573673474cbd089dec83688331c117add (git) before a5336035728d77efd76306940d742a6f23debe68
affected

30e388d573673474cbd089dec83688331c117add (git) before 6cb9df81a2c462b89d2f9611009ab43ae8717841
affected

Default status
affected

6.11
affected

Any version before 6.11
unaffected

6.11.3 (semver)
unaffected

6.12 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/a5336035728d77efd76306940d742a6f23debe68

git.kernel.org/...c/6cb9df81a2c462b89d2f9611009ab43ae8717841

cve.org (CVE-2024-49956)

nvd.nist.gov (CVE-2024-49956)